Executive Summary

Informations
Name CVE-2014-7187 First vendor Publication 2014-09-28
Vendor Cve Last vendor Modification 2018-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26631
 
Oval ID: oval:org.mitre.oval:def:26631
Title: SUSE-SU-2014:1247-1 -- Security update for bash
Description: The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances (CVE-2014-7169). Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and is less serious due to the special, non-default system configuration that is needed to create an exploitable situation. To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_. This hardening feature is work in progress and might be improved in later updates. Additionally, two other security issues have been fixed: * CVE-2014-7186: Nested HERE documents could lead to a crash of bash. * CVE-2014-7187: Nesting of for loops could lead to a crash of bash. Security Issues: * CVE-2014-7169 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169> * CVE-2014-7186 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186> * CVE-2014-7187 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187>
Family: unix Class: patch
Reference(s): SUSE-SU-2014:1247-1
CVE-2014-7169
CVE-2014-6271
CVE-2014-7186
CVE-2014-7187
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 10
SUSE Linux Enterprise Desktop 11
Product(s): bash
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27163
 
Oval ID: oval:org.mitre.oval:def:27163
Title: USN-2364-1 -- bash vulnerabilities
Description: Several security issues were fixed in Bash.
Family: unix Class: patch
Reference(s): USN-2364-1
CVE-2014-7186
CVE-2014-7187
Version: 3
Platform(s): Ubuntu 14.04
Ubuntu 12.04
Ubuntu 10.04
Product(s): bash
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27981
 
Oval ID: oval:org.mitre.oval:def:27981
Title: SUSE-SU-2014:1259-1 -- bash (important)
Description: The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances (CVE-2014-7169). Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and it is less serious due to the special, non-default system configuration that is needed to create an exploitable situation. To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_ . This hardening feature is work in progress and might be improved in later updates. Additionaly two more security issues were fixed in bash: CVE-2014-7186: Nested HERE documents could lead to a crash of bash. CVE-2014-7187: Nesting of for loops could lead to a crash of bash.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:1259-1
CVE-2014-7169
CVE-2014-6271
CVE-2014-7186
CVE-2014-7187
Version: 3
Platform(s): SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28370
 
Oval ID: oval:org.mitre.oval:def:28370
Title: VMware product updates address critical Bash security vulnerabilities
Description: Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
Family: unix Class: vulnerability
Reference(s): CVE-2014-7187
Version: 4
Platform(s): VMWare ESX Server 4.1
VMWare ESX Server 4.0
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 28

ExploitDB Exploits

id Description
2014-10-02 GNU bash 4.3.11 Environment Variable dhclient Exploit

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-09-25 IAVM : 2014-A-0142 - GNU Bash Shell Code Execution Vulnerability
Severity : Category I - VMSKEY : V0054753

Snort® IPS/IDS

Date Description
2014-11-16 Bash CGI nested loops word_lineno denial of service attempt
RuleID : 32049 - Revision : 2 - Type : OS-OTHER
2014-11-16 Bash CGI nested loops word_lineno denial of service attempt
RuleID : 32047 - Revision : 2 - Type : OS-OTHER

Nessus® Vulnerability Scanner

Date Description
2016-02-02 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_bash_20141031_2.nasl - Type : ACT_GATHER_INFO
2015-12-30 Name : The remote VMware ESX host is missing a security-related patch.
File : vmware_VMSA-2014-0010_remote.nasl - Type : ACT_GATHER_INFO
2015-10-05 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_11.nasl - Type : ACT_GATHER_INFO
2015-08-25 Name : The remote IBM Storwize V7000 Unified device is affected by multiple vulnerab...
File : ibm_storwize_1_5_0_4.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-164.nasl - Type : ACT_GATHER_INFO
2015-01-29 Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit...
File : macosx_10_10_2.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_bash_20141031.nasl - Type : ACT_GATHER_INFO
2014-12-22 Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10648.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2014-0010.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote Cisco TelePresence Conductor device is affected by a command injec...
File : cisco_telepresence_conductor_CSCur02103.nasl - Type : ACT_GATHER_INFO
2014-11-13 Name : The remote host is affected by a code injection vulnerability known as Shells...
File : mcafee_ngfw_SB10085.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote host has an application installed that is affected by multiple vul...
File : vmware_vcenter_converter_2014-0010.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote host is affected by a code injection vulnerability known as Shells...
File : mcafee_web_gateway_sb10085.nasl - Type : ACT_GATHER_INFO
2014-11-11 Name : The remote host is affected by a code injection vulnerability known as Shells...
File : mcafee_email_gateway_SB10085.nasl - Type : ACT_GATHER_INFO
2014-11-11 Name : The remote host is missing a vendor-supplied security patch.
File : cisco_cups_CSCur05454.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1311.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2014-1354.nasl - Type : ACT_GATHER_INFO
2014-11-06 Name : The remote host has a virtualization appliance installed that is affected by ...
File : vcenter_operations_manager_vmsa_2014-0010.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote host has a device management application installed that is affecte...
File : vmware_workspace_portal_vmsa2014-0010.nasl - Type : ACT_GATHER_INFO
2014-11-03 Name : The remote host is affected by a command injection vulnerability.
File : vmware_nsx_vmsa_2014_0010.nasl - Type : ACT_GATHER_INFO
2014-11-03 Name : The remote SIP server uses scripts that allow remote command execution via Sh...
File : shellshock_sip_invite.nasl - Type : ACT_ATTACK
2014-11-03 Name : The management application installed on the remote host is affected by a comm...
File : cisco-sa-CSCur01959-prsm.nasl - Type : ACT_GATHER_INFO
2014-11-03 Name : The remote security device is missing a vendor-supplied security patch.
File : cisco-sa-CSCur01959-asa-cx.nasl - Type : ACT_GATHER_INFO
2014-10-31 Name : The remote host has a virtualization appliance installed that is affected by ...
File : vmware_vsphere_replication_vmsa_2014_0010.nasl - Type : ACT_GATHER_INFO
2014-10-31 Name : The remote host is running a vulnerable version of Bash.
File : cisco_ucs_director_CSCur02877.nasl - Type : ACT_GATHER_INFO
2014-10-28 Name : The remote host has a mail agent installed that allows remote command executi...
File : shellshock_mail_agents.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2014-10-27 Name : The remote device is running a version of NX-OS that is affected by Shellshock.
File : cisco-sa-20140926-bash-nxos.nasl - Type : ACT_GATHER_INFO
2014-10-21 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-595.nasl - Type : ACT_GATHER_INFO
2014-10-21 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-594.nasl - Type : ACT_GATHER_INFO
2014-10-21 Name : The version of Cisco TelePresence Video Communication Server installed on the...
File : cisco_telepresence_vcs_CSCur01461.nasl - Type : ACT_GATHER_INFO
2014-10-20 Name : The remote host is affected by a remote code execution vulnerability.
File : palo_alto_PAN-SA-2014-0004.nasl - Type : ACT_GATHER_INFO
2014-10-17 Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit...
File : macosx_10_10.nasl - Type : ACT_GATHER_INFO
2014-10-17 Name : The remote host is missing a Mac OS X update that fixes multiple security iss...
File : macosx_SecUpd2014-005.nasl - Type : ACT_GATHER_INFO
2014-10-16 Name : The remote host has a virtualization appliance installed that is affected by ...
File : vmware_vcenter_server_appliance_vmsa-2014-0010.nasl - Type : ACT_GATHER_INFO
2014-10-13 Name : The remote Solaris system is missing a security patch for third party software.
File : solaris11_bash_2014_10_07.nasl - Type : ACT_GATHER_INFO
2014-10-13 Name : A system shell on the remote host is vulnerable to command injection.
File : bash_cve_2014_7169.nasl - Type : ACT_ATTACK
2014-10-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-419.nasl - Type : ACT_GATHER_INFO
2014-10-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2380-1.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-567.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15629.nasl - Type : ACT_GATHER_INFO
2014-10-09 Name : The remote host is missing Sun Security Patch number 149080-02
File : solaris9_x86_149080.nasl - Type : ACT_GATHER_INFO
2014-10-09 Name : The remote host is missing Sun Security Patch number 149079-03
File : solaris9_149079.nasl - Type : ACT_GATHER_INFO
2014-10-06 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201410-01.nasl - Type : ACT_GATHER_INFO
2014-10-06 Name : A system shell on the remote host is vulnerable to command injection.
File : bash_remote_code_execution2.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2014-10-03 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_81e2b3084a6c11e4b7116805ca0b3d42.nasl - Type : ACT_GATHER_INFO
2014-10-02 Name : The remote VMware ESX host is missing a security-related patch.
File : vmware_VMSA-2014-0010.nasl - Type : ACT_GATHER_INFO
2014-10-01 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4a4e9f88491c11e4ae2cc80aa9043978.nasl - Type : ACT_GATHER_INFO
2014-09-30 Name : The remote FTP server is affected by a remote code execution vulnerability.
File : proftpd_bash_injection.nasl - Type : ACT_ATTACK
2014-09-30 Name : The remote host is is affected by a remote code execution vulnerability, comm...
File : macosx_shellshock_update.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bash-140926.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-190.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-563.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-564.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1306.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote mail server uses scripts that allow remote command execution via S...
File : shellshock_postfix_filters.nasl - Type : ACT_ATTACK
2014-09-29 Name : The remote mail server allows remote command execution via Shellshock.
File : shellshock_qmail.nasl - Type : ACT_ATTACK
2014-09-29 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2364-1.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote host is missing Oracle Security Patch number 149080-01
File : solaris9_x86_149080-01.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote host is missing Oracle Security Patch number 149079-01
File : solaris9_149079-01.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote host is missing Oracle Security Patch number 126547-06
File : solaris10_x86_126547-06.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote host is missing Oracle Security Patch number 126546-06
File : solaris10_126546-06.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1306.nasl - Type : ACT_GATHER_INFO
2014-09-26 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1306.nasl - Type : ACT_GATHER_INFO
2014-09-25 Name : A system shell on the remote host is vulnerable to command injection.
File : bash_remote_code_execution_telnet.nasl - Type : ACT_ATTACK
2014-09-24 Name : The remote web server is affected by a remote code execution vulnerability.
File : bash_cve_2014_6271_rce.nasl - Type : ACT_ATTACK
2012-09-26 Name : The remote host is missing Sun Security Patch number 126546-10
File : solaris10_126546.nasl - Type : ACT_GATHER_INFO
2012-09-17 Name : The remote host is missing Sun Security Patch number 126547-10
File : solaris10_x86_126547.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
BUGTRAQ http://www.securityfocus.com/archive/1/533593/100/0/threaded
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
CONFIRM http://support.apple.com/HT204244
http://support.novell.com/security/cve/CVE-2014-7187.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
http://www-01.ibm.com/support/docview.wss?uid=swg21686084
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
http://www-01.ibm.com/support/docview.wss?uid=swg21686447
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
http://www.novell.com/support/kb/doc.php?id=7015721
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
http://www.qnap.com/i/en/support/con_show.php?cid=61
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
https://kb.bluecoat.com/index?page=content&id=SA82
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
https://support.apple.com/HT205267
https://support.citrix.com/article/CTX200217
https://support.citrix.com/article/CTX200223
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr...
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr...
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGovie...
https://www.suse.com/support/shellshock/
FULLDISC http://seclists.org/fulldisclosure/2014/Oct/0
HP http://marc.info/?l=bugtraq&m=141330468527613&w=2
http://marc.info/?l=bugtraq&m=141345648114150&w=2
http://marc.info/?l=bugtraq&m=141383026420882&w=2
http://marc.info/?l=bugtraq&m=141383081521087&w=2
http://marc.info/?l=bugtraq&m=141383138121313&w=2
http://marc.info/?l=bugtraq&m=141383196021590&w=2
http://marc.info/?l=bugtraq&m=141383244821813&w=2
http://marc.info/?l=bugtraq&m=141383304022067&w=2
http://marc.info/?l=bugtraq&m=141450491804793&w=2
http://marc.info/?l=bugtraq&m=141576728022234&w=2
http://marc.info/?l=bugtraq&m=141577137423233&w=2
http://marc.info/?l=bugtraq&m=141577241923505&w=2
http://marc.info/?l=bugtraq&m=141577297623641&w=2
http://marc.info/?l=bugtraq&m=141585637922673&w=2
http://marc.info/?l=bugtraq&m=141694386919794&w=2
http://marc.info/?l=bugtraq&m=141879528318582&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142289270617409&w=2
http://marc.info/?l=bugtraq&m=142358026505815&w=2
http://marc.info/?l=bugtraq&m=142358078406056&w=2
http://marc.info/?l=bugtraq&m=142721162228379&w=2
JVN http://jvn.jp/en/jp/JVN55667175/index.html
JVNDB http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
MISC http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-001...
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellsho...
MLIST http://openwall.com/lists/oss-security/2014/09/25/32
http://openwall.com/lists/oss-security/2014/09/26/2
http://openwall.com/lists/oss-security/2014/09/28/10
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1311.html
http://rhn.redhat.com/errata/RHSA-2014-1312.html
http://rhn.redhat.com/errata/RHSA-2014-1354.html
SECUNIA http://secunia.com/advisories/58200
http://secunia.com/advisories/59907
http://secunia.com/advisories/60024
http://secunia.com/advisories/60034
http://secunia.com/advisories/60044
http://secunia.com/advisories/60055
http://secunia.com/advisories/60063
http://secunia.com/advisories/60193
http://secunia.com/advisories/60433
http://secunia.com/advisories/61065
http://secunia.com/advisories/61128
http://secunia.com/advisories/61129
http://secunia.com/advisories/61188
http://secunia.com/advisories/61283
http://secunia.com/advisories/61287
http://secunia.com/advisories/61291
http://secunia.com/advisories/61312
http://secunia.com/advisories/61313
http://secunia.com/advisories/61328
http://secunia.com/advisories/61442
http://secunia.com/advisories/61479
http://secunia.com/advisories/61485
http://secunia.com/advisories/61503
http://secunia.com/advisories/61550
http://secunia.com/advisories/61552
http://secunia.com/advisories/61565
http://secunia.com/advisories/61603
http://secunia.com/advisories/61618
http://secunia.com/advisories/61622
http://secunia.com/advisories/61633
http://secunia.com/advisories/61636
http://secunia.com/advisories/61641
http://secunia.com/advisories/61643
http://secunia.com/advisories/61654
http://secunia.com/advisories/61703
http://secunia.com/advisories/61816
http://secunia.com/advisories/61855
http://secunia.com/advisories/61857
http://secunia.com/advisories/61873
http://secunia.com/advisories/62312
http://secunia.com/advisories/62343
SUSE http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html
http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
UBUNTU http://www.ubuntu.com/usn/USN-2364-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
Date Informations
2021-05-04 12:33:54
  • Multiple Updates
2021-04-22 01:41:03
  • Multiple Updates
2020-05-23 00:42:15
  • Multiple Updates
2019-03-18 12:02:51
  • Multiple Updates
2018-10-10 00:19:52
  • Multiple Updates
2018-08-09 09:19:22
  • Multiple Updates
2017-01-03 09:22:55
  • Multiple Updates
2016-04-28 13:28:16
  • Multiple Updates
2016-04-27 01:12:23
  • Multiple Updates
2016-04-26 13:27:45
  • Multiple Updates
2016-02-03 13:27:47
  • Multiple Updates
2015-12-31 13:26:09
  • Multiple Updates
2015-10-18 17:22:56
  • Multiple Updates
2015-10-10 09:23:02
  • Multiple Updates
2015-10-07 13:24:25
  • Multiple Updates
2015-09-02 13:39:11
  • Multiple Updates
2015-08-27 13:38:38
  • Multiple Updates
2015-05-19 21:28:59
  • Multiple Updates
2015-05-14 21:28:26
  • Multiple Updates
2015-05-12 09:28:05
  • Multiple Updates
2015-03-31 13:28:52
  • Multiple Updates
2015-03-27 09:26:57
  • Multiple Updates
2015-03-21 00:26:33
  • Multiple Updates
2015-03-20 00:26:34
  • Multiple Updates
2015-03-18 09:27:43
  • Multiple Updates
2015-03-13 17:23:00
  • Multiple Updates
2015-03-13 00:22:25
  • Multiple Updates
2015-03-12 09:23:47
  • Multiple Updates
2015-02-26 13:24:19
  • Multiple Updates
2015-01-31 09:21:39
  • Multiple Updates
2015-01-30 13:24:20
  • Multiple Updates
2015-01-21 13:27:07
  • Multiple Updates
2014-12-24 09:24:12
  • Multiple Updates
2014-12-23 13:26:37
  • Multiple Updates
2014-12-03 09:27:33
  • Multiple Updates
2014-11-27 13:28:36
  • Multiple Updates
2014-11-20 09:25:02
  • Multiple Updates
2014-11-19 05:36:11
  • Multiple Updates
2014-11-16 21:25:18
  • Multiple Updates
2014-11-14 13:29:06
  • Multiple Updates
2014-11-14 13:26:29
  • Multiple Updates
2014-11-13 13:27:16
  • Multiple Updates
2014-11-12 13:27:24
  • Multiple Updates
2014-11-08 13:32:00
  • Multiple Updates
2014-11-07 13:26:28
  • Multiple Updates
2014-11-05 13:29:39
  • Multiple Updates
2014-11-05 13:28:05
  • Multiple Updates
2014-11-04 13:27:34
  • Multiple Updates
2014-11-01 13:26:41
  • Multiple Updates
2014-10-31 13:25:57
  • Multiple Updates
2014-10-28 13:27:11
  • Multiple Updates
2014-10-28 13:24:56
  • Multiple Updates
2014-10-24 13:28:43
  • Multiple Updates
2014-10-22 13:26:03
  • Multiple Updates
2014-10-17 13:25:34
  • Multiple Updates
2014-10-16 13:27:08
  • Multiple Updates
2014-10-16 13:25:46
  • Multiple Updates
2014-10-12 13:27:29
  • Multiple Updates
2014-10-11 13:26:26
  • Multiple Updates
2014-10-10 13:28:03
  • Multiple Updates
2014-10-08 13:25:06
  • Multiple Updates
2014-10-04 13:32:39
  • Multiple Updates
2014-10-04 13:29:26
  • Multiple Updates
2014-10-03 13:27:22
  • Multiple Updates
2014-10-03 13:24:57
  • Multiple Updates
2014-10-02 13:28:27
  • Multiple Updates
2014-09-30 13:27:36
  • Multiple Updates
2014-09-30 00:25:33
  • Multiple Updates
2014-09-29 00:26:21
  • First insertion